ISCA Chapter 1 Notes 1
ISCA Chapter 1 Notes 1
ISCA Chapter 1 Notes 1
CHAPTER 1
CONCEPT OF GOVERNANCE AND MANAGEMENT OF INFORMATION
SYSTEM
1. KEY CONCEPT OF GOVERNANCE:
In this changing environment, enterprises have to adapt itself. Senior management is responsible for
ensuring that right structure of decision making accountabilities are shared among people in the
enterprise and where accountability is shared, governance comes into force.
Now let us move towards various aspects used in this concept:
A. GOVERNANCE:
-- Derived from Greek word meaning “To steer”.
-- Governance: All means and mechanism that will enable
stakeholder to have an organised mechanism for
evaluation, monitoring compliances and
performance.
B. ENTERPRISE GOVERNANCE:
-- Defined as: Set of responsibilities & practices exercised by
the board and executive management to ensure
proper monitoring, objectives are achieved,
risks are managed properly.
-- It is framework into which many tools, techniques and codes
of best practices can fit.
C. CORPORATE GOVERNANCE:
-- Defined as: System by which a company or enterprise is directed & controlled to achieve the
objectives of increasing shareholder value by enhancing the economic
performance.
-- Refers to: Structure and processes for direction and control of companies.
Corporate governance is all about ensuring that companies act in the best interests of their
owners -- the shareholders -- who have invested their savings, their children's college funds or
their retirement funds in the company. Corporate governance is also about considering the
interests of other entities impacted by the company -- employees, the environment and even
communities.
Toyota is a global leader in automotive sales, technology and production while also retaining
one of the world’s most recognizable and highly valued brands. At the heart of their success is
the innovative and ground breaking production methods made possible by the company’s
recognition of the value of employee empowerment. At Toyota, the company has employed
these proven techniques of co-determination to encourage employee and supplier involvement
in their decision making process, since these practices “help improve both the ability and
attitude” of stakeholders
INFORMATION SYSTEM CONTROLS AND AUDIT 2
Management is of the view that IT is an important part to achieve the organisational objectives. IT
provides critical inputs to meet the information need of stakeholders. Hence corporate governance drives
and sets IT governance.
“IT GOVERNENCE”: System by which IT activities are directed and controlled to achieve business
objectives. Hence it can be said that there is an inseparable relationship between
corporate governance and IT governance or IT Governance is a sub-set of
Corporate/enterprise governance.
BENEFITS OF GOVERNANCE:
GOVERNANCE DIMENSION:
1. CONFORMANCE/CORPORATE GOVERNANCE:
--This focus on regulatory requirements.
--This covers issues like role of chairman, CFO, board of directors composition, control assurance,
risk management for compliance.
--These are established oversight mechanism to ensure that good corporate governance processes
are effective.
--The conformance dimension is monitored by the audit committee.
--Example: Sarbanes Oxley Act of US, Clause 49 of listing agreement.
First of all, everyone will be wondering what is GEIT!!!..... So here’s the definition:
“GEIT” : GOVERNANCE OF ENTERPRISE IT.
However, IT governance and GEIT are used interchangeably, but GEIT is macro in term and a broader
concept.
IT GOVERNANCE:
OBJECTIVE:
The objective is to determine and cause the desired behaviour and results to achieve the strategic impact
of IT.
DEFINITION:
System by which IT activities are directed and controlled to achieve business objective. Hence it can be
said that there is an inseparable relationship between corporate governance and IT governance or IT
Governance is a sub-set of Corporate/enterprise governance.
WHAT DECISION
MAKING
MECHANISM
ARE REQUIRED
HOW DECISION IS MADE
KEY PRACT ICES
T O DET ERMINE
ST AT US OF IT
GOVERNANCE
INFORMATION REQUIRED
BENEFITS OF GOVERNANCE:
Governance of enterprise IT (GEIT) is a sub set of corporate governance & facilitates implementation of
IS control framework.
Its objective is to analyze and articulate (Expressing oneself easily in clear and effective language) the
requirement for governance of enterprise IT.
There is an urge of mandating the implementation of corporate governance integrated with the ERM and
internal controls. The corporate governance specifies the DISTRIBUTION OF RIGHTS and
responsibilities of different participants such as BOARD, MANAGER, and SHAREHOLDER ETC.
OTHER POINTS:
ENTERPRISE RISK MANAGEMENT (ERM) in business includes the methods and processes used by
organizations to manage risks and seize opportunities related to the achievement of their objectives. ERM
provides a framework for risk management, which typically involves identifying particular events or
circumstances relevant to the organization's objectives (risks and opportunities), assessing them in terms
of likelihood and magnitude of impact, determining a response strategy, and monitoring progress.
Company management must provide reasonable assurance regarding the reliability of the financial
statement & reporting for external purposes as per general accepted accounting principles and policies &
procedures:
Under final rules, a company audit report must contain report on internal control of management
containing:
2ND STEP
3RD STEP
(Mitigation)
1ST STEP
5TH STEP
• ज नक री • ऱग त र ननगर नी
आिश्यकत (Monitoring)
( Information
and
communication
system )
1. Control Environment:
-- Entity need to develop and maintain controlled environment,
-- Including categorising the business process on materiality/criticality basis.
2. Risk assessment:
-- Each business process is associated with some risk.
-- As such there is necessity of regular assessment of the risks.
3. Control activities:
-- Control activities must be developed to manage, mitigate and reduce
-- Risk associated with business processes.
5. Monitoring:
-- Internal control processes must be continuously monitored;
-- And adaptable to changing conditions
C. Clause 49:
- Clause 49 of SEBI also mandates the implementation of ERM and internal controls.
- Holds senior management responsible legally for the implementation.
5. ROLE OF IT in ENTERPRISES:
In today corporate scenario, IT is not confined for the data processing but also it has some competitive
advantages too.
Online transactions, MIS, decision support system are the extended uses of IT technology. Now-a-days, IT
is used to perform business processes, activities and tasks.
Role of the auditor is to ensure that internal controls implemented are working as desired. However,
auditor role is of immense important at the time of implementing these controls. This requires that
auditor must have good understanding of the concept of enterprise strategy.
B. IT steering Committee:
Planning is needed for determining and monitoring the
achievement of the enterprise goals. Management needs
information for crucial decisions, so the element of
planning is an essential part of developing effective
information system.
“IT STEERING COMMITTEE”: Led by the board of director and comprises of functional head
from all the departments.
INFORMATION SYSTEM CONTROLS AND AUDIT 9
As it is shown in the above diagram that board of directors are on the driving wheel, so we can evaluate
the working and accountability flow:
-- To ensure long & short term plans of IT department are in tune with the
organisation objectives and goals.
6. IT STRATEGY PLANNING:
Why we plan: Planning is the process of thinking about and organizing the activities required to achieve a
desired goal.
1. Management must ensure that IT long and short term plans are communicated to business process
owners.
2. Management should establish processes to capture & report feedback from business owners.
INFORMATION SYSTEM CONTROLS AND AUDIT 10
STRATEGIC PLANNING
STRATEGIC PLANNING
1. Statement of mission.
2. Specification of strategic objectives.
3. Assessment of environmental & organisational factors.
4. Statement to achieve organisational objectives.
5. Listing of the priorities.
5. Feasibilities checking.
We will study that a system has to be build up on the requirement of the users. Similarly, IS
requirement plan has to be drawn on the basis of information architecture requirements.
Following are the enablers of information architecture:
INFORMATION SYSTEM CONTROLS AND AUDIT 12
It contains:
1. Information model representing the business.
INFORMATION 2. Enterprise का information architectural standards.
SYSTEM OF THE
3. Data repository and dictionary.
ORGANISATION 4. Data syntax rules.
5. Data ownership & security classifications.
1. Information model business में मौजूद है! 2. Information system का standard is there.
3. Information system में DATA है so repository and depository and syntax rule too.
4. यह DATA protect करना है !
OBJECTIVE OF IT STRATEGY:
There are few key management practices, which are required for aligning IT strategy with the enterprise
strategy:
Understand the
enterprises
direction
Conduct a gap
analysis
Business value is achieved from the use of IT by ensuring the optimisation of value contribution to
business from business processes, IT services and IT assets resulting from IT enabled investments at an
acceptable cost. Following are the key management practices needed to be followed for the evaluation
“whether business value is derived from IT”:
Alignment of IT services and business objectives: (IT का कारोबार उद्देश्यों के साथ गठबांधन)
1. Evaluate the value optimisation: ( Whether goals are achievable with IT assets)
-- Evaluate the portfolio of IT enabled investments, services and assets to determine the likelihood of
achieving organisational objectives.
-- The objectives and delivering the values at reasonable cost is the main point of value optimisation.
7. RISK MANAGEMENT:
IT GOVERNANCE STRUCTURE
Effective IT governance helps to ensure close linkage to the enterprises and IT risk management. IT
governance is an integral part of corporate risk management. There must be a procedure to communicate
the status of risks involved to key stakeholders so as to ensure that proper steps can be taken up.
Now we are talking about the risk but what are the sources of risk?? (जोखिम के स्रोत)
The most important step in risk management is to identify the SOURCES OF THE RISK, the areas from
which they occur. Some of the common sources of risks are:
ASSETS:
Asset can be defined as something of value to the organisation. Example information in e-form, software
system, employees...Following are the characteristics of the assets:
VULNERABILITY:
-- Examples on vulnerability:
-- Leaving door unlocked makes the house vulnerable to theft.
-- Use of short passwords which are prone to cracking or hacking
-- We have studied about the vulnerability and examples. But why vulnerabilities arise..!!!
THREATS:
-- Any entity, circumstances with the potential to harm the software system or component through
unauthorised access, destructions or modifications
-- It is an action, event or condition where there is compromise in the quality and ability to harm
the organisation
Exploits
Leads to
RISK
VULNERABILITIES
ATTACKS
-- Threats exists where there is asset. Asset is nothing but the data contained in information system.
Threat has the capability to attack on the system with the intent to harm it.
INFORMATION SYSTEM CONTROLS AND AUDIT 17
EXPOSURE:
-- It is the extent of the loss to the organisation when a risk materialised (occurs).
-- For instance, loss of business, loss of reputation, violation of the privacy etc.
LIKELIHOOD: (सांभावना)
-- It is the estimation of probability that threat will succeed in achieving undesirable threat.
ATTACK:
-- It is an attempt to gain unauthorised access to the system services. In software terms, an attack is a
malicious intentional fault that has intent of exploiting vulnerabilities.
RISK:
COUNTER MEASURE:
An action, device, procedure, technique that reduces the vulnerability of a system or Component is
referred as counter measure.
OWNER:
1. Wish to minimise the risk by applying countermeasure.
2. Owner must value the assets he posses.
3. Owner must impose counter measure to reduce risk.
INFORMATION SYSTEM CONTROLS AND AUDIT 18
THREAT AGENT:
1. Threat agents give rise to threats,
2. That increases the risk IRO assets that may damage the system.
-- RESIDUAL RISK: Any risk remaining after the counter measures are analysed & implemented.
When risks are identified and analysed, it is important to know how to deal with them. It means if threat is
minor then it will be useless to implement expensive control processes against them. Risk management
strategy is explained as below:
Now I am explaining the same in HINDI, the ways to manage the risk: CODE TO
1. जोखिम ऩर ध्यान न दें 2. जोखिम शे यर करना REMEMBER
3. जोखिम को स्वीकार करना 4. जोखिम को कम करना
T-S.A.M.E
5. जोखिम को समाप्त करना
Now same in Detail: (please relate the above points with the given below points)
1. Turn Back: (जोखिम ऩर ध्यान न दें)
-- Where the probability and impact of risk is low, then management may ignore such risks.
COBIT framework provides excellent management strategy and practices from governance and management
practices.
The governance domain contains 5 governance processes, one of which focuses on the stakeholders risk
related objectives.
Ensure that an IT risk management framework exists to identify, analyze, mitigate, manage, monitor and
communicate IT-related business risk, and that the framework for IT risk management is in alignment with
the enterprise risk management (ERM) framework.
-- Ensures that enterprise risk appetite and tolerance are understood, communicated.
-- Provide guidance on how to ensure IT related risks doesn’t exceed risk appetite & tolerance.
-- Impact of IT risk to enterprise is identified and managed.
Ensure that an IT risk management framework exists to identify, analyze, mitigate, manage,
--This process requires continually identifying, assessing and reducing IT related risk within tolerance
levels set up by the enterprise executive management.
--This process aims to integrate management of IT related enterprise risks with ERM (enterprise risk
management) and balance the benefit and cost of managing IT related risks.
INFORMATION SYSTEM CONTROLS AND AUDIT 20
RISK
MANAGEMNENT
So far we have been confronted with two terms GOVERNANCE and MANAGEMENT. So now we
will study the key practices of risk management covering the aforesaid terms.
INFORMATION SYSTEM CONTROLS AND AUDIT 21
1. Data Collection:
-- Identify and collect relevant data to ensure effective IT related risk identification, analysis &
reporting.
2. Analyse Risk:
-- Develop useful information to support risk decisions.
6. Respond to Risk:
-- Respond in timely manner so as to limit the magnitude of the loss from IT related events.
INFORMATION SYSTEM CONTROLS AND AUDIT 22
8. IT COMPLIANCE REVIEW :
To ensure effective ERM (Enterprise Risk Management), the regulators feels the need to mandate its
enforcement to comply with governance, risk management & compliance. (GRC)
COMPLIANCES IN COBIT 5 :
The MANAGEMENT Monitor, Evaluate and Assess domain contains a compliance focused process:
Evaluate that IT processes and IT-supported Ensure that the enterprise is compliant with
business processes are compliant with laws, all applicable external requirements.
regulations and contractual requirements.
Obtain assurance that the requirements have
been identified and complied with, and
integrate IT compliance with overall
enterprise compliance.
1. It has to be ensured that MEA03 (compliance with external regulatory requirements) complied with but
also of the enterprise governance determined policies, procedures and principles.
2. COBIT 5 suggests accountabilities and responsibilities for enterprises roles and governance structure for
each process.
3. COBIT 5 frameworks include necessary guidelines to support GRC objectives and supporting activities.
4. COBIT has a specific focus on compliance activities within the framework and explains how they fit
within the enterprise picture.
As per COBIT, information is the success drivers but also it can’t be ignored that it also raises governance
and management issues too. This section explains need for using approach and latest thinking for reviewing
and implementing governance and management of enterprise IT.
1. Allows IT to be governed and managed in a holistic manner for the entire enterprises.
2. It helps to manage IT related risks and ensure compliances, continuity, security and privacy.
3. It is useful for all types or sizes of the enterprises.
INFORMATION SYSTEM CONTROLS AND AUDIT 24
-- Enterprise needs good, reliable, repeatable data on which they can take good business decision.
-- COBIT 5 is made and is customised to suit all the enterprises irrespective of their size, industries and
geographical areas
-- COBIT 5 provides enterprises a tool necessary to understand, utilise, implement and direct important IT
related activities.
It is based on an enterprise view and is aligned with governance best practices. COBIT 5 acts as the
single framework, which serves as a consistent and integrated source of guidance.
- GEIT
This fourth edition of the IT Governance Institute’s status report of the governance of enterprise IT
covers 21 countries and 10 industries. It reveals accord on the contribution of IT to business success,
the challenges and opportunities connected with IT the impact of the economic crisis and views on
IT outsourcing, social networking.
- ITIL
The Information Technology Infrastructure Library (ITIL) is a set of practices for IT service
management (ITSM) that focuses on aligning IT services with the needs of business
- TOGAF
The Open Group Architecture Framework (TOGAF) is a high level and holistic approach to
design, which is modelled at four levels: Business, Application, Data, and Technology. It aims at
giving a well-tested overall starting model to information architects, which can then be built upon. It
relies heavily on modularization, standardization and already existing, proven technologies and
products.
- ISO 27000
The series provides best practice recommendations on information security management, risks and
controls within the context of an overall information security management system (ISMS). It is
applicable to organizations of all shapes and sizes. All organizations are encouraged to assess their
information security risks, and then implement appropriate information security controls according
to their needs
IMP: No need to remember the explanation to above said best practices.
INFORMATION SYSTEM CONTROLS AND AUDIT 25
COMPONENTS OF COBIT:
COMPONENTS DESCRIPTION
FRAMEWORK Organise IT governance objectives and good
practices by IT domains and processes and
links to business requirement.
PROCESS DESCRIPTION Common language for everyone in the
entity. The processes map to responsibilities
areas of plan, build, run and monitor.
CONTROL OBEJCTIVES Provide comprehensive requirements to be
considered by the management for effective
control for the processes.
MANAGEMENT GUIDELINES Helps in assigning responsibilities, agree on
objective, measure performance.
MATURITY MODEL Organise IT governance objectives and good
practices by IT domains and processes.
BENEFITS OF COBIT 5:
IT RELATED BENEFITS:
1. COBIT 5 helps in managing IT related risks and ensure compliances, security and privacy.
2. COBIT 5 enables in providing clear development and good practices for IT management.
1. COBIT 5 enables enterprises in achieving their objectives for governance and management of enterprise
IT.
2. COBIT 5 helps enterprises to create optimal value from IT by maintaining a balance between realizing
benefits and optimizing risks level and resource use.
3. COBIT 5 enables IT to be governed in such a manner that to ensure full end-to-end business and IT
functional areas of responsibilities, considering the interest of internal and external stakeholders.
GENERAL BENEFITS:
1. COBIT 5 supports compliance with relevant laws, regulations, agreements and policies.
2. COBIT 5 is useful for all types of organization whether commercial or not.
COBIT 5 can be tailored to meet the enterprise’s need. Because of its open design, it can be applied to meet
needs related to:
There are 5 key principles for governance & management of enterprise IT.
Meeti ng
Sta keholder
Needs
Sepa rating
Coveri ng the
Governa nce
enterprises end
from
to end
ma nagement
COBIT 5
PRINCIPLES
Appl ying a
Ena bling a
s i ngle
hol istic
i ntegrated
a pproach
fra mework
-- COBIT 5 doesn’t focus on IT function but treats information as an asset that need to be dealt with just
like any other asset.
-- It considers all in the enterprise whether internal or external that is relevant to governance &
management of enterprise information and related IT.
INFORMATION SYSTEM CONTROLS AND AUDIT 27
STAKEHOLDERS EXECUTION
-- It is a single integrated framework that enables complete company coverage, providing a basis to
integrate effectively other frameworks.
-- COBIT 5 defines a set of enablers to support the implementation of governance and management system
for enterprise IT.
EVALUATE
DIRECT MONITOR
MANAGEMENT
COBIT 5 is the successor of the COBIT 4.1 process model, incorporating both RISK IT and VAT IT
framework. COBIT 5 enabler model comprises of 37 governance and management processes:
GOVERNANCE PROCESSES:
MANAGEMENT PROCESSES:
COBIT 5 ENABLERS:
Enablers are the factors that collectively and individually influence whether something will work.
Enablers are driven by the GOALS. The COBIT 5 framework describes 7 categories of the enablers. In
Hindi, I would rather say factors ko क्या हालसऱ करना चाहहए for a good governance.
PROCESSES ORGANISATIONAL CULTURE, ETHICS &
STRUCTURE BEHAVIOR
To remember: In organisation structure there are people with skill & competencies that use information
to introduce principles, policies & framework in the processes so that there exist good culture, ethics &
behaviour. After all this, company can provide quality services, infrastructure & applications.
1.Organisational Structure: This is the key decision making entities in the enterprises.
2.People with skill & competencies: All this required for successful completion of all activities and for
making correct decision.
3. Information: It is needed at all level of management. It is required to keep organisation running and well
governed.
4. Principles, policies & framework: These are the vehicle to translate desired goals into practical guide
for day-to-day operations.
5.Culture, ethics & behaviour: Of individuals & enterprises is important part for the governance &
management activities.
6.Services, infrastructure & applications: This provides company information technology processing and
services.
COBIT 5 includes a process reference that describes in detail a number of governance and management
processes. Characteristics:
GRC primarily aimed towards compliances of legal requirements, it is advisable to consider business
requirements so as to optimise the investment in implementing the IT resources.
1.It is responsibility of management to ensure proper implementation and monitoring of GRC measures.
INFORMATION SYSTEM CONTROLS AND AUDIT 30
Success of a GRC program can be measured by using the following goals and metrics:
(GRC क ययक्रम की सफऱत के क्य ऱऺण है)
In this rapid and inter-linked business scenario, it is imperative for the business to critically and effectively
govern the information and related technologies.
As a result the management is under tremendous pressure to ensure effective use of the information and
technology and IT related investments.
So there begins new challenges for the CHARTERED ACCOUNTANTS to cope up with the changing
environment and provide assurance with required level of confidence.
Auditors have to understand the business processes and also the business policies and
procedures as implemented.
Also management execute its business through staff and thus it is required that staff have
defined job responsibilities.
The organization structure needs to have internal control structure. IT impacts the way
business operations could be performed and internal controls are implemented. Auditor
must know the organization structure.
INFORMATION SYSTEM CONTROLS AND AUDIT 31
1. Engineered to meet the expectations of multiple stakeholder (External & internal Stakeholders).
2. External Stakeholders: Customers, business partners: Internal Stakeholders: Board, employees etc.
3. It is non-technical language and hence can be understood by the management too.
IT governance can be evaluated by both internal and external auditor. However, Institute of Internal
Auditor (IIA) issues guidance on internal audit. Features of guidelines:
1. Relates to governance structure and practices which are subject to internal audit.
2. Following are the key components that lead to effective IT governance : (auditor को क्या verify करना है)
a. Leadership:
-- There must be synchronization between IT objectives and business needs. Auditor must evaluate
the ability of leadership to effectively communicate the nexus between the two to IT &
organizational personnel.
-- Evaluate the leaders’ involvement in development & execution of entity strategic goals.
-- Review how roles & responsibilities are assigned within IT organization.
-- Review the role of senior management in maintaining of strong IT governance.
b. Organizational structure:
-- Evaluate how management & IT personnel are interacting and communicating needs of entity.
-- This should include existence of roles and reporting relationships to allow IT to meet needs of the
organization.
INFORMATION SYSTEM CONTROLS AND AUDIT 32
c. Processes:
-- Evaluate IT process activities, and controls in place to mitigate risks to the organization.
-- Evaluate processes that are used by IT organization to support IT environment & consistent
delivery of the services.
d. Risks:
-- Review of the processes used by IT organization to identify, assess, monitor and mitigate risks.
-- Determine the accountability of the personnel within the risk management.
e. Controls:
-- Assess the key controls defined by IT to manage its activities and support to the organization.
-- Ownership, documentation and reporting of self validation aspects.
-- Controls must be strong enough to address the identified risks based on the organization’s appetite
for the risks.
f. Performance measurement:
-- Evaluate the framework and systems in place to measure the organizational outcomes where IT
plays an important role in business operations.
Institute of Internal Auditor (IIA) provides areas which have to be reviewed by internal auditor as part of
review of governance, risk management & compliance. (GRC) areas:
A. SCOPE:
-- Internal audit activities must evaluate and contribute to improvement in
governance, risk management and control processes by using approaches.
B. GOVERNANCE:
The internal audit must assess and make recommendations for improving the
governance process for the following objectives:
-- Performance of organizational to be ensured.
-- Ethics promotion within the organization.
-- Activities coordination and communication among management and auditors.
-- Risk Communication and control information to required areas of organization.
D. RISK MANAGEMENT:
-- Auditor must evaluate effectiveness and management’s contribution in improvement in the risk
management processes.
INFORMATION SYSTEM CONTROLS AND AUDIT 33
E. INTERPRETATION:
-- Determine whether risk management processes are in place and effective in operations. Auditor must
examine and evaluate that:
1. Significant risks are identified. 2. Appropriate risks response identified that aligns with risk appetite.
3. Relevant risk information is captured and communicated to the all levels of the management.
-- Review covers CONTROLS over the IT process of assessing and managing risks .
(जोखिम को assess करना और manage के प्रक्रिया ऩर ननयांत्रण का review)
-- Controls over risks must assure to management that enterprise all relevant risks as relevant to IT
implementation.
-- Generally the review considers whether the entity is engaging itself in risk-identification, impact
analysis, taking cost effective measures to mitigate the risks.
COBIT 5 has specific process: MEA02 Monitor, Evaluate and assess the system of internal control.
-- P rovide guidelines on evaluating and assessing internal controls implemented in an enterprise.
There are some key practices for assessing and evaluating the internal control system:
(I am for the sake of learning dividing the points in the following manner)
-- Business Process Following things are covered under this review of internal control:
Efficiency --Review operation of controls ( How controls work in entity)
--Review of monitoring & test evidences to ensure controls are
effectively operating.
--Maintain of evidences such as per periodic testing of controls,
independent assessment etc.
-- Report Control --Identify deficiencies in controls and analyze the root cause of such
deficiencies deficiencies.
--Report such deficiencies to the stakeholders.
-- Scope Assurance --Define and agree with management on scope of assurance initiative based
Initiatives on assurance objectives.
-- Execute Assurance
--Execute planned assurance initiatives.
Initiatives --prepare report on identified findings.
--Provide assurance opinions, recommendation for improvements related
to operational performance, external compliance & internal controls.